Post job

Security System Engineer remote jobs

- 630 jobs
  • Sr Security Engineer

    LHH 4.3company rating

    Remote job

    Top Must Haves to Include in Submittal Required: 4+ years of experience with a Senior Security Engineer Title. Required: 4+ years of experience with active threat hunting, looking for potential attacks rather than just passively waiting for attacks Required: Experience with Microsoft Defender, Sentinel, Azure Security Center, and Microsoft 365 security solutions, helping to identify vulnerabilities, mitigate threats, and enhance security postures. Required: 4+ years of experience with Microsoft Defender for Endpoint Required: 4+ years of experience with Microsoft Sentinel (SIEM/SOAR) Required: 4+ years of experience with Azure Security Center & Microsoft Purview Compliance Manager Required: Certifications such as OSCP, OSWE, CISSP, CEH, GPEN, AZ-500 (Microsoft Azure Security Engineer), SC-200 (Microsoft Security Operations Analyst), or SC-300 (Microsoft Identity and Access Administrator) are a plus. Required: 3+ years of experience in Microsoft security technologies and tools such as Purview Information Protection Required: 4+ years of experience with Managed Extended Detection and Response (MXDR) Required: 9 out of 10 communication skills (must be able to understand everything they say and must have 10 out of 10 English comprehension. Accents are ok.) Very Nice To Have: 2+ years of experience with red team/blue team exercises to test defenses and improve security operations. Very Nice To Have: 2+ years of experience evaluating, influencing, and recommending technology and product direction What does the company do Insurance Location / Address: Orange, California On-Site / Hybrid / Remote Fully Remote in any State in the US (PST Hours) Reports To: Director of IT Infrastructure Does this Position have Direct Reports No COVDI19 Vax required No vaccination requirements Accept Visa / H1b Sponsorship No (GC or USC only) Schedule PST hours Dress code Business Professional Full Time Compensation Base Salary: 120k-143k (could be flexible but would need approval) Signing Bonus Potential: Potentially (would need approval) Discretionary Bonus? Yes, they have an annual discretionary bonus but did not specify an exact percentage. Annual Base Salary Merit Increase: Up to 4% per year Stock: No 401k Match: 30% match up to 100% of IRS Annual Contribution Allotment Relocation: No (fully remote role) ---------------------------------------------------------------------------- Minimum of 6+ years hands-on experience directly related to security (Minimum of 4 years as Sr. Level position) Proactive hands-on threat hunting experience looking for potential attacks and identifying potential security risks Deep experience and understanding of Microsoft Defender, Sentinel, Azure Security Center Experience with Managed Extended Detection and Response (MXDR) Security related certifications such as Certified Ethical Hacker (CEH), AZ-500 (Microsoft Azure Security Engineer) Certified Information Systems Security Professional (CISSP) Reports to -- Director of IT Infrastructure Perform active threat hunting, looking for potential attacks rather than just passively waiting for attacks Perform red team/blue team exercises to test defenses and improve security operations. Assists with vulnerability assessments, using provided security tools to identify system vulnerabilities Design and implement security controls across cloud and on-premises environments Create and maintain security monitoring and alerting solutions Data Loss Prevention (DLP): Monitor DLP alerts, investigate incidents, and recommend actions to relevant teams to mitigate data breaches. Assists in the planning and deployment of the companys cloud information security strategies Manage Infrastructure and application security monitoring tools to detect and respond to security incidents in real-time Participate in the development and improvement of the company's SDLC processes, ensuring security practices are integrated into all stages of product development Responsible for evaluating, influencing, and recommending technology and product direction Stay informed on the latest cybersecurity trends, emerging threats, attack techniques, and zero-day vulnerabilities affecting Microsoft environments and other relevant technologies. On-site or remote regular attendance and punctuality are essential functions of the job. Perform other business tasks or functions as assigned. Qualifications Knowledge, Skills & Abilities Required: Experience with Microsoft Defender, Sentinel, Azure Security Center, and Microsoft 365 security solutions, helping to identify vulnerabilities, mitigate threats, and enhance security postures. Deep knowledge of Microsoft security solutions o Microsoft Defender for Endpoint o Microsoft Sentinel (SIEM/SOAR) o Azure Security Center & Microsoft Purview Compliance Manager o Microsoft Intune and Conditional Access Policies Strong understanding of security principles and best practices Strong knowledge and hands on experience with Data Loss Prevention Hands-on experience in threat hunting Certifications such as OSCP, OSWE, CISSP, CEH, GPEN, AZ-500 (Microsoft Azure Security Engineer), SC-200 (Microsoft Security Operations Analyst), or SC-300 (Microsoft Identity and Access Administrator) are a plus. Proficiency in Microsoft security technologies and tools such as Purview Information Protection, Defender for Cloud and Sentinel Experience with Managed Extended Detection and Response (MXDR) Proficient in Microsoft Office programs, including Word, Excel, PowerPoint, as well as Outlook. Adhere to all PHI (Protected Health Information) and HIPAA (Health Insurance Portability and Accountability Act) guidelines. Educational Requirements: High School Diploma or equivalent required. Bachelors degree in Computer Science, Cyber Security or equivalent experience required. Minimum of six (6) years of hands-on experience in IT with a focus on security. Physical Requirements:??Must be able to sit for extended periods and occasionally stand and walk. Must have adequate hearing for phone work. Vision requirements include close vision and the ability to adjust focus. Must be able to communicate effectively in English. Must be able to use a keyboard and other office equipment. Ability to lift up to 10 pounds occasionally. “Benefit offerings include medical, dental, vision, life insurance, short-term disability, additional voluntary benefits, EAP program, commuter benefits, and 401K plan. Our program provides employees the flexibility to choose the type of coverage that meets their individual needs. Available paid leave may include Paid Sick Leave, where required by law; any other paid leave required by Federal, State, or local law; and Holiday pay upon meeting eligibility criteria.” “Equal Opportunity Employer/Veterans/Disabled To read our Candidate Privacy Information Statement, which explains how we will use your information, please navigate to ******************************************* The Company will consider qualified applicants with arrest and conviction records in accordance with federal, state, and local laws and/or security clearance requirements, including, as applicable: • The California Fair Chance Act • Los Angeles City Fair Chance Ordinance • Los Angeles County Fair Chance Ordinance for Employers • San Francisco Fair Chance Ordinance”
    $135k-177k yearly est. 4d ago
  • Federal Information Security Engineer - FISMA, GRC, NIST; Public Trust (Hybrid)

    Peyton Resource Group 3.5company rating

    Remote job

    6 month Contract-to-Hire Contract Rate: $60-67/hr on W2 Salary Conversion: $145-155K, DOE Hybrid; 3 days/week onsite work is required Must be a US Citizen or Green Card/Permanent Resident Ability to obtain a Public Trust Clearance is required Technical Environment (preferred): CSAM, Splunk, Tenable, Palo Alto, Checkmarx Summary: Immediate need for a FISMA Information Security Engineer to bridge the gap between technical security controls and federal compliance requirements. This position involves both security engineering and governance, risk, and compliance (GRC) activities, primarily centered around the Federal Information Security Modernization Act (FISMA) and the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF). FISMA/NIST Compliance & Documentation, Auditing & Reporting: Implement and Monitor Controls: Implement, document, and monitor security controls in accordance with NIST SP 800-53 (Security and Privacy Controls for Federal Information Systems and Organizations). Assessment & Authorization (A&A) Support: Support the Authorization process, including contributing to security assessments, control validation, and evidence gathering to achieve and maintain an Authority to Operate (ATO). System Security Plan (SSP) Management: Assist in the development, maintenance, and update of System Security Plans (SSPs), including continuous monitoring strategies and Plans of Action and Milestones (POA&Ms). Coordinate and support Internal & External Security Audits (e.g., Office of Inspector General (OIG), independent assessors). Reporting: Generate reports on security control compliance, vulnerability posture, and POA&M status for stakeholders and the Authorizing Official (AO). Security Engineering & Operations: Control Implementation: Consult on the configuration and management of security tools and systems (e.g., SIEM, vulnerability scanners, intrusion detection/prevention systems) to effectively enforce NIST 800-53 controls. Vulnerability Management: Analyze results, prioritize remediation efforts based on risk to the system's security categorization (e.g., FIPS 199), and track POA&M completion. Incident Response: Participate in security incident response planning and testing activities, ensuring all incidents are documented and handled in compliance with federal reporting requirements. Change Management: Review system and network change requests to ensure security implications are addressed and maintain the security posture of authorized systems. Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field Relevant security certifications 3-5+ years of progressive, hands-on experience in Federal IT Security Engineering 2-4+ years of experience focusing on federal compliance (FISMA, NIST RMF) Technical environment: CSAM, Splunk, Tenable, Palo Alto, Checkmarx About PRG With 20+ years of success in the staffing industry, Peyton Resource Group focuses on matching talent to the precise needs of our clients. Your success is our commitment, and we back up that commitment by only recommending opportunities that align with your goals. Our candidate-centric approach ensures you are in the driver's seat of your career, and our team of recruiters will partner with you and support you every step of the way. PRG's dedication to service has been widely recognized throughout the industry. PRG has been awarded ClearlyRated's Best of Staffing award for 10+ years, as well as the Business Journal's Best Places to Work in Dallas, San Antonio and Austin.
    $60-67 hourly 3d ago
  • Information Security Analyst

    Ispace, Inc.

    Remote job

    Title: Information Security Analyst Duration: 12+ months contract Hybrid role 3 days Office, 2 days work from home Pay rate$60 per hr on W2 Local to Los Angeles candidates only Summary This is a hands-on security position working within the Information Security group and with the internal IT department at large. This position's core focus is to ensure consistent, measurable end to end delivery of security services. The successful candidate will work to develop and deploy capabilities ensuring enterprise systems and data are protected with the security controls and tools required to meet policy and compliance requirements. We are looking for candidates who have a passion for cybersecurity, threat detection, risk mitigation and response. You will be a key part of our efforts to build and support a defensible environment where we are able to detect, contain and respond quickly to threats and compromises in ways that serve to enable the business needs of a highly collaborative organization. The environment is fast-paced and commonly on the leading edge of technology, including early adoption of various cloud services along with the challenges of integrating those services into our security practice. Responsibilities Support a Technology Vendor Management program, ensuring technology risk reviews across multiple disciplines, and monitoring for renewals and savings opportunities Participate in risk reviews of the IT control framework (NIST CSF, CIS, ITIL, ISO 270001, etc.) Conduct thorough vendor, product and applications security assessments partnering with systems owners to integrate security early during the project lifecycle. Coordinate, across service owners, the implementation of core security integrations (SSO, Event Logs, Secrets, Alerting, Threat Model and Backup/Recovery) with applications developed in-house and externally/SaaS hosted environments. Partner with business groups to review workflows, producing output to enhance security processes in support of those workflows. Support the development and implementation of a data protection program. Coordinate with IRM leadership to develop and deliver key security metrics to ensure technical security controls are meeting desired objectives; ensuring the measurable effectiveness of CAA's technical controls. Required Capabilities A minimum of 2-3 years in Information Technology A minimum of 2 years' experience in cybersecurity risk management A Bachelor's or Master's Degree in a relevant field of work Strong analytical skills in conducting due diligence to identify, assess and prioritize vendor risks Familiarity with information security frameworks (NIST, ISO27001), data privacy regulations (GDPR, CCPA), and information security certifications/attestations (SOC, ISO, PCIDSS, FedRAMP) Experience in coordinating technical integrations for security tooling and processes. Ability to review complex systems architectures to identify key security integration opportunities Produce a comprehensive, written, security assessment of vendors security posture Experience using security analytics tooling to produce operational metrics and dashboards A strong understanding of the fundamental operations of servers, operating systems, cloud applications, and infrastructure Desired Skills Core skills in Cybersecurity fundamentals and Third Party Risk Management Familiarity with using Third Party Risk Management tools/processes such as One Trust, SIG or similar GRC platforms. Hands-on experience in Azure, AWS Cloud environments and familiarity with core Cloud services and Cloud architecture Familiarity with core security concepts of Single Sign-on (e.g PingFed, SAML), Identity and Access Administration (Active Directory, Azure AD, AWS IAM), Event Management (Splunk), Expert skills in using Microsoft Office suite, JIRA. If you're interested in above role please send me your updated resume to *******************************
    $60 hourly 3d ago
  • Cyber Security Engineer

    Lucas James Talent Partners

    Remote job

    Our client Dscout is a flexible Experience Research Platform for capturing in-context insights from high-quality participants, bridging the gap between product teams and users. Leading brands like Sonos, Spotify, Duolingo and Best Buy use Dscout to test ideas, iterate quickly, collaborate, and build confidently. We are expanding our smart and driven team and would love for you to join us. We are looking for a Cybersecurity Engineer to become a part of the Cybersecurity team reporting to the VP, Compliance and Information. The Cybersecurity Engineer will contribute to reducing risk within the Dscout SaaS environment and internal IT systems. This includes planning and implementing cybersecurity controls, supporting cybersecurity operations, and monitoring the threat landscape. This role will ensure Dscout controls operate effectively over time. What You Will Do Lead the process to build security into the Dscout SaaS environment. This includes applying security throughout the software development lifecycle. Collaborate with Engineering to plan and implement cybersecurity controls to protect the SaaS environment. This includes applying leading practices to secure AWS resources (e.g., VPCs, EC2 instances, and containers). Continually enhance security monitoring of the SaaS environment and internal IT services by implementing SIEM and working with Engineering to continuously improve logging and auditability. Assess evolving threats and develop recommendations to mitigate risk to Dscout. You will provide weekly threat intelligence reports highlighting potential risk to the organization. Work side-by-side with Engineering to analyze, contain, and mitigate cyber attacks and other related incidents. Perform vulnerability monitoring and, where appropriate, ensure remediation. Participate in the development of security policies and processes. Assist third party risk reviews. Provide recommendations to continually improve security controls. Assist in development of security programs and efforts to promote security awareness. What you need to have (we can call them Desired Skills and Background): Experience working with developers to conduct security reviews and provide strong recommendations to manage risk. This includes a strong understanding and practical use of OWASP Top 10 (web and AI). Experience securing AWS cloud environments and infrastructure as code solutions such as Terraform. Proven ability to implement security monitoring tools such as Datadog. This includes the ability to identify relevant scenarios and ensure proper logging. Experience responding to cyber attacks such as bots and account compromise as well as threats like data leakage and infected computers. Strong knowledge of cloud computing environments. Working knowledge of security in software development and continuous integration/continuous delivery (CI/CD). Experience documenting and implementing security policies and processes. Knowledge of security frameworks and standards: ISO 27001, NIST, or SANS preferred. Experience with HITRUST and/or SOC 2 certification is preferred. Good communication, documentation and presentation skills. Limitless curiosity and insatiable appetite to understand human behavior and relevant technologies. Background Bachelor's degree is preferred CISSP, CCSP, or GIAC security certification preferred A minimum of 3 years of security experience Of course, what is outlined above is an ideal set of expectations, but things may shift based on business needs, and other projects and tasks could be added at the discretion of your manager. About Dscout Dscout is a team of passionate, empathetic, and curious professionals. As a recognized leader in the Forrester Wave, we're at the cutting edge of experience research technology. The power of research drives us-how in-context insights from real people can build more enjoyable products and services. We prioritize learning, sharing, and building. We also deeply value being a diverse and inclusive team and company and look for team members who align with that belief. Join our dynamic team and help shape product roadmaps and business strategies for the world's most loved brands. It doesn't stop there. When you join the Dscout team, you will get: * A strong and competitive compensation package with a built-in bonus and equity program. * An incredible and progressive benefits package (for both you and your dependents) to support work/life balance, including flexible PTO, 16 company holidays, 12 weeks of paid parental leave, 401k match, and much more. * An education stipend to support your growth & development and a remote work stipend. * A company that is open and transparent with our team. You will know what is happening and why it matters. Dscout is an equal-opportunity employer that values diversity. We do not discriminate based on identity, including race, color, religion, national origin or ancestry, sex, gender identity and expression, age, physical or mental disability, pregnancy, veteran or military status, unfavorable discharge from military service, genetic information, sexual orientation, marital status, order of protection status, citizenship status, arrest record or expunged or sealed convictions, or any other legally recognized protected basis under federal, state, or local law. If you need reasonable accommodations for any part of the employment process, please email us at accommodations@dscout.com with the nature of your request and your contact information. We'll do all we can to ensure you're set up for success during our interview process while upholding your privacy, including accommodation requests. Please note that only inquiries concerning a request for reasonable accommodation will be responded to from this email address. When you apply at Dscout, we will process your job applicant data, including your employment and education history, transcript, writing samples, and references, as necessary to consider your job application for open positions. For more information about our privacy practices, please visit our Privacy Policy. Dscout participates in the E-Verify program in certain locations, as required by law. NOTE: DSCOUT NEVER CONTACTS JOB APPLICANTS VIA TEXT, MESSENGER, OR OTHER SIMILAR APPLICATIONS. BE AWARE OF PHISHING AND SPOOFING SCAMS, BOTH VIA TEXT AND EMAIL. ONLY RESPOND TO EMAILS FROM DSCOUT.COM #BI-Remote #LI-Remote
    $68k-92k yearly est. 2d ago
  • Nuclear Cyber Security Engineer - REMOTE

    JSG (Johnson Service Group, Inc.

    Remote job

    IF YOU DO NOT HAVE THE REQUIRED BACKGROND IN THE U.S. COMMERCAL NUCLEAR INDUSTRY, PLEASE DO NOT APPLY. Immediate opening for a Cyber Security Engineer with commercial nuclear background, to perform design modifications (involving digital upgrades) as well as preparing cyber assessments on those digital components. Prefer direct/perm hire, will consider contract. This person will be the go-to individual for Cyber related projects. Must be familiar with NEI-08-09, EPRI graded approach, have digital mod experience, and extensive understanding of plant SSC (Safety Classification of Structures, Systems, and Components). Site Cyber qualifications to perform CSAT (Cyber Security Assessment Team) would be a plus. Compensation based on experience, but likely in the 140K-$160K range. JSG offers medical, dental, vision, life insurance options, short-term disability, 401(k), weekly pay, and more. Johnson Service Group (JSG) is an Equal Opportunity Employer. JSG provides equal employment opportunities to all applicants and employees without regard to race, color, religion, sex, age, sexual orientation, gender identity, national origin, disability, marital status, protected veteran status, or any other characteristic protected by law. #D650
    $160k yearly 1d ago
  • OT Security Architect

    First Quality 4.7company rating

    Remote job

    We are seeking an OT Security Architect to work remotely. This position will be responsible for safeguarding our operational technology infrastructure. This role offers the flexibility to work remotely with periodic travel to our manufacturing sites. First Quality is a growing manufacturing organization that has defined security as one of its key business values. Joining our team will provide you with unique personal and professional growth opportunities where you'll be hands-on and securing cutting-edge industrial automation and technologies contributing to a growing field where cybersecurity directly protects critical processes, manufacturing, and safety. Primary responsibilities include: • Primarily responsible for OT security event monitoring, management, and response • Create an IS reference architecture for our OT networks • Work with OT engineering team, as well as with SOC team and verify that the reference architecture fits the business processes and requirements • Work with OT engineering teams for defining security controls for their on-going projects • Provide technical guidance to the GRC team with assessing OT 3rd party vendor and supply chain • Integrate with OT engineering projects and verify that the required IS controls are properly implemented • Revise and develop processes to strengthen the current OT Security Operations Framework, review policies and highlight the challenges in managing SLAs • Perform threat management, threat modeling, identify threat vectors and develop use cases for OT security monitoring including red\blue penetrations tests • Responsible for developing, configuring, and maintaining OT security automation and orchestration IR's and tools. • Creation of reports, dashboards, metrics for OT security operations and presentation to Sr. Mgmt. • Create required standards and procedures (i.e. IS purchasing standard, sanitization process) in coordination with all relevant stakeholders The ideal candidate should possess the following: • Minimum of five (5) years of professional experience in OT security and operations. • Knowledge of controls and automation equipment and principles (i.e. PLCs, SCADA, DCS, HMIs, VFDs, etc.) • Familiarity with security frameworks and standards such as NIST, ICS Mitre ATT&CK, and IEC 62443 • Experience in defining and implementing security controls for OT engineering projects. • Experience managing projects with the abilities to prioritize tasks and manage time effectively. • Experience in developing, configuring, and maintaining OT security automation and orchestration tools. • Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field. In lieu of degree, related experience will be considered. • Background in manufacturing controls is preferred What We Offer You We believe that by continuously improving the quality of our benefits, we can help to raise the quality of life for our team members and their families. At First Quality you will receive: • Competitive base salary and bonus opportunities • Paid time off (three-week minimum) • Medical, dental and vision starting day one • 401(k) with employer match • Paid parental leave • Child and family care assistance (dependent care FSA with employer match up to $2500) • Bundle of joy benefit (years' worth of free diapers to all team members with a new baby) • Tuition assistance • Wellness program with savings of up to $4,000 per year on insurance premiums • ...and more! First Quality is committed to protecting information under the care of First Quality Enterprises commensurate with leading industry standards and applicable regulations. As such, First Quality provides at least annual training regarding data privacy and security to employees who, as a result of their role specifications, may come in to contact with sensitive data. First Quality is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, sexual orientation, gender identification, or protected Veteran status. For immediate consideration, please go to the Careers section at ******************** to complete our online application.
    $85k-133k yearly est. 5d ago
  • Network Security Engineer II

    Glocomms 4.3company rating

    Remote job

    Sr. Network Engineer II Employment Type: Full-Time Sponsorship: Not Provided We're seeking an experienced Sr. Network Engineer to join a growing IT team and play a key role in designing, implementing, and maintaining enterprise-level network infrastructure. This is a remote position available exclusively to candidates residing in Idaho or Utah. What You'll Do Plan, implement, and support network projects, including risk assessment and migration strategies. Configure and maintain Cisco routers, switches, wireless, remote access, and WAN devices. Recommend and implement new technologies to improve network performance and scalability. Monitor global network performance, troubleshoot issues, and perform preventative maintenance. Collaborate with carriers for circuit procurement and migrations. Maintain accurate technical documentation and configurations. Participate in on-call rotation and occasional travel as needed. What You'll Bring 6+ years of hands-on networking and troubleshooting experience in multiprotocol environments. 5+ years with router/switch technology and routing protocols (BGP, MPLS, EIGRP). 4+ years supporting LANs, VLANs, WLANs, VPNs, NAT, and DHCP services. 3+ years with network security products and protocols (IPS/IDS, IPSEC VPN). CCNP preferred. Experience with Cisco Nexus (9k, 7k, 5k), ISR, ASR, Next Gen Firewalls, Meraki wireless. Familiarity with monitoring tools (SolarWinds, Splunk, ThousandEyes, AppDynamics). Strong leadership, problem-solving, and communication skills.
    $74k-112k yearly est. 1d ago
  • Offensive Cyber Analyst / Programmer 1

    Lockheed Martin Corporation 4.8company rating

    Remote job

    may be eligible for a $25K sign on bonus for external hires! What We're Doing: Lockheed Martin, Cyber & Intelligence invites you to step up to one of today's most daunting challenges: the use of advanced electronics to undermine our way of life. You'll develop innovative offensive cyber capabilities that help protect the nation and the world. Cyber | Lockheed Martin Who we are: Are you driven by the thrill of outsmarting even the most advanced security systems and networks? Do you find satisfaction in crafting innovative solutions to stay one step ahead of the adversary? If so, join Lockheed Martin Cyber & Intelligence's elite Offensive Cyber team, where we don't just test defenses - we pioneer the techniques, tools, and exploits that define the cutting edge of offensive cyber operations. Why Join Us: Your Health, Your Wealth, Your Life Our flexible schedules, competitive pay and comprehensive benefits enable you to live a healthy, fulfilling life at and outside of work. Learn more about Lockheed Martin's competitive and comprehensive benefits package. We support our employees, so they can support our mission. The Work: A CNO (Computer Network Operations) offensive cyber professional can be described as a 'cyber warrior,' harnessing their expertise in computer systems and networks to disrupt and disable adversary capabilities. Alternatively, they can be referred to as a 'digital operator,' skillfully navigating the virtual battlefield to achieve strategic objectives. They can also be characterized as 'cyber operatives,' leveraging their knowledge of cybersecurity and computer networks to conduct operations and gather critical intelligence. We are hiring for a variety of roles including vulnerability analysts, exploit developers, hardware/software reverse engineers, offensive cyber tool developers, embedded developers, and cyber researchers. We want your expertise in traditional computing (Windows/Linux/MacOS), mobile technology (Android/iOS), wireless technology, IoT, ICS/SCADA, enterprise technologies, and special-purpose embedded and real-time systems. Come join a company with incredible breadth and depth in the nature of programs and technologies we support that will never leave you bored or looking for your next assignment. #RMSC6ISR #RMSCYTJ #OneLMHotJobs #RMSTG2025 Basic Qualifications: * Candidate must possess active US security clearance with a polygraph * 4+ years overall experience * Bachelor of Science in Math, Science, Engineering, Statistics, Engineering Management, or related discipline. May substitute an additional four years' experience in lieu of a Bachelor's Degree. Masters degree can be substituted for 2 years of experience. * Experience programming in any of the following: Assembly, C, C++, Python * Experience with Offensive Cyber Tools and Techniques Desired Skills: * Interest in offensive cyber solutions * Experience using network sockets programming including developing packet-level programs, expert packet-level understanding of IP, TCP, and application-level protocols Security Clearance Statement: This position requires a government security clearance, you must be a US Citizen for consideration. Clearance Level: TS/SCI w/Poly Other Important Information You Should Know Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Ability to Work Remotely: Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility. Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits. Schedule for this Position: 9x80 every other Friday off Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $93,200 - $164,450. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. (Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year. This position is incentive plan eligible. Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics. The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration. At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility. If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications. Experience Level: Experienced Professional Business Unit: RMS Relocation Available: Possible Career Area: Cyber Security Type: Task Order/IDIQ Shift: First
    $93.2k-164.5k yearly 40d ago
  • Consultant - Cyber Security Analyst (Fractional/Contract Role)

    Arootah

    Remote job

    Join our experienced roster of consultants that support Hedge Funds and Family Offices. Arootah is a personal and professional development leader in the Investment and Financial Services industry. Our mission is to provide top business advisory services to our hedge fund client base. We focus our Business Consulting on the multi-faceted needs of Hedge Funds and Family Offices. Arootah was founded by Rich Bello, the Co-Founder and COO of the industry-leading $10 billion hedge fund, Blue Ridge Capital. Rich brings more than 30 years of experience, including leadership positions at Morgan Stanley, Tiger Management, and Ernst & Young. Visit us at **************************************** for more information. WHO WE NEED: Arootah is searching for experienced Cybersecurity Analysts to consult to our highly prestigious client base. As a consultant, you will work with our Hedge Fund and Family Office clients to provide expert advice. Having previously served in this role, you have specific, hands-on experience implementing, maintaining, and operating a cybersecurity program for a leading Hedge Fund or Family Office. What You'll Do Best practice reviews. Developing realistic and effective action plans. Breaking apart goals into actionable steps. Advising on vendor selection and oversight. Creating and implementing policies, procedures, and control measures. Evaluating each client's advancement toward goal actualization through key performance indicators (KPIs) and scoring matrices. Special projects or other areas of need. Implement and assist with the day-to-day operations of securing the firm's various information systems by providing technical expertise in all areas of network, system, and application security. Protect sensitive information by installing and configuring security software like firewalls and encryption programs. Monitor network traffic and analyze records like authentication logs to identify and investigate anomalies to prevent and detect security incidents. Lead the firm's vulnerability management program, conduct the annual cybersecurity assessments and penetration tests, and research and report on emerging threats, to help the firm take pre-emptive risk mitigation steps. Implement organization-wide security best practices to protect the business against existing, new, and emerging security threats. Test and analyze the organization's business continuity and disaster recovery plan to ensure operations will continue in the event of a cyberattack or natural disaster. Assesses new security technologies to determine potential value for the firm. Execute and carry out firm incident response program to identify and prevent all potential breaches (internal or external), or misuse of data, that may occur. Review, investigate, and respond to real-time alerts within the environment. Generate real-time and historical reports for internal and external stakeholders regarding security and/or compliance violations. Qualifications A Bachelor's degree in Computer Science, Computer Engineering, Information Systems, Information Sciences, or a related field, with a strong academic record. One or more of the following certifications: CEH, CISM, CompTIA Security+, CISSP, GSEC, GCIH, GNFA, GREM or other related SANS certifications. 5+ years of specific experience as a Cybersecurity Analyst at a hedge fund or family office. Working experience with one or more of the following technology vendors and products: Splunk Cloud, Rapid7 Nexpose Vulnerability Scanner, Sophos Antivirus, Varonis DatAlert, ForeScout CounterACT, or similar. Thorough understanding of Microsoft's enterprise technology platform, including Azure, Active Directory, SQL, Office365, and the Windows server and desktop operating systems. In-depth knowledge of security event management, network security monitoring, investigating common types of attacks, network packet analysis, log collection and analysis, and reviewing security events. Demonstrated experience implementing and/or enforcing security and compliance frameworks such as NIST, Cobit, and ISO. Strong writing and presentation skills are requiredin order to communicate findings and recommendations, as well as the ability to articulate security-related concepts to a broad range of technical and non-technical staff. Job Status Contractor Hours are based on the needs of the assigned client (0-40 hours per week). Join a well-funded disruptor in finance and technology. Enjoy the flexibility of remote work and choosing your assignments. Be part of a dynamic, high-energy company in its expansion stage. Now is the time to join! For more information, visit us at Arootah.com.
    $75k-102k yearly est. Auto-Apply 60d+ ago
  • Security Systems Engineer (Remote)

    Cisco 4.8company rating

    Remote job

    The application window is expected to close on 12/08/2025. Job posting may be removed earlier if the position is filled or if a sufficient number of applications are received. **AI at Cisco** With Cisco, you're not just embracing the future - you're helping create it! We are focused on integrating AI into our solutions to transform collaboration, security, networking, observability, and more. We are innovating ethical AI products and infrastructure that enable our customers to stay ahead of cyberattacks, predict and prevent network outages, and make team meetings more productive. Our extensive data sets and broad customer reach means limitless possibilities for you to build impactful AI solutions that solve a wide array of real-world problems. Join us at Cisco where you will innovate with top AI experts and be a part of our mission to power an inclusive future for all. **AI in the Business Unit** The Cisco Security group includes such industry leading security suites and products as Hypershield, Cisco Secure Access, Identity Intelligence, Duo, XDR, Cisco Security AI, Talos, and more. We are using machine learning and GenAI across our products to simplify security, prevent sophisticated attacks, and ensure the secure use of large language models (LLMs). In Security, we are building AI-enhanced cybersecurity for better outcomes, combining AI with the breadth of Cisco telemetry across the network, private and public cloud infrastructure, applications, internet, email, and endpoints. With Security AI, we make it simple to use natural language instruction and interact with GenAI - from deploying and managing firewall policies to streamlining incident response. With Duo, we are creating extensive machine learning and analytics to detect and block suspicious users. We are harnessing our rich security expertise in conjunction with AIML to transform the way we assist, augment, and automate security efforts for our customers! We need your help to tip the scale in favor of defenders and enable enterprises everywhere to cancel bad actors. **Meet the Team** You will be a part of our Cisco Security Innovation team within the Security Business Group. This team incubates ideas that turn into the future of Cisco's innovative security solutions. You will play a pivotal role in driving scalable performance AI models to improve the efficacy of threat detections. You will bring your expertise in deep learning and large transformer models conduct research, design and development of state-of-the-art ML/AI techniques applicable to threat detection, including anomaly detection, behavioral analysis, signature generation, and predictive modeling. The techniques are focused toward realtime efficacy and evaluating scalable architectures. **Your Impact** + Leverage modern AI/ML techniques to improve the accuracy of threat detection solutions and automate/accelerate manual analysis processes. + Develop and implement advanced machine learning models across different hardware environments (including cloud and network edge); models may include adapting neural network architectures or creating novel ones to address challenges. + Develop methods to identify performance metrics and efficacy of the models especially of the hardware accelerated models. + Analyze and extract significant patterns in high-dimensional data spaces using advanced techniques. + Implement robust software systems for integrating and maintaining machine learning models. + Collaborate with software engineering teams to design primary deployment strategies for machine learning models into security systems. + Establish and maintain best practices for machine learning and security operations, including clear documentation of models and procedures. **Minimum Qualifications:** + Bachelor's degree or higher in Computer Science or related field + 5+ years of related security experience, specifically in the areas of network security environments + Experience with multi-threaded environments + Experience with Linux operating systems and embedded Linux environments **Preferred Qualifications:** + Master's or PhD degree in Computer Science, Computer Engineering, or a related field + Experience with state-of-the art machine learning techniques and libraries + Debugging skills in complex hardware/software + Coding experience with Python, C/C++, etc. + Experience with software development environments and version control systems (e.g. Git) + A strategic problem solver in the areas of threat detection and analysis + Experience optimizing machine learning or deep learning models for specific hardware + Familiarity with hardware acceleration libraries (e.g., Morpheus, cu DNN, TensorRT, OpenVINO). + Experience with containerization technologies (e.g., Docker, Kubernetes) in the context of hardware-specific deployments + Knowledge of cybersecurity concepts and threat detection methodologies + Low-level Kernel coding experience \#LI-RN1 **Why Cisco?** At Cisco, we're revolutionizing how data and infrastructure connect and protect organizations in the AI era - and beyond. We've been innovating fearlessly for 40 years to create solutions that power how humans and technology work together across the physical and digital worlds. These solutions provide customers with unparalleled security, visibility, and insights across the entire digital footprint. Fueled by the depth and breadth of our technology, we experiment and create meaningful solutions. Add to that our worldwide network of doers and experts, and you'll see that the opportunities to grow and build are limitless. We work as a team, collaborating with empathy to make really big things happen on a global scale. Because our solutions are everywhere, our impact is everywhere. We are Cisco, and our power starts with you. **Message to applicants applying to work in the U.S. and/or Canada:** The starting salary range posted for this position is $165,000.00 to $241,400.00 and reflects the projected salary range for new hires in this position in U.S. and/or Canada locations, not including incentive compensation*, equity, or benefits. Individual pay is determined by the candidate's hiring location, market conditions, job-related skillset, experience, qualifications, education, certifications, and/or training. The full salary range for certain locations is listed below. For locations not listed below, the recruiter can share more details about compensation for the role in your location during the hiring process. U.S. employees are offered benefits, subject to Cisco's plan eligibility rules, which include medical, dental and vision insurance, a 401(k) plan with a Cisco matching contribution, paid parental leave, short and long-term disability coverage, and basic life insurance. Please see the Cisco careers site to discover more benefits and perks. Employees may be eligible to receive grants of Cisco restricted stock units, which vest following continued employment with Cisco for defined periods of time. U.S. employees are eligible for paid time away as described below, subject to Cisco's policies: + 10 paid holidays per full calendar year, plus 1 floating holiday for non-exempt employees + 1 paid day off for employee's birthday, paid year-end holiday shutdown, and 4 paid days off for personal wellness determined by Cisco + Non-exempt employees** receive 16 days of paid vacation time per full calendar year, accrued at rate of 4.92 hours per pay period for full-time employees + Exempt employees participate in Cisco's flexible vacation time off program, which has no defined limit on how much vacation time eligible employees may use (subject to availability and some business limitations) + 80 hours of sick time off provided on hire date and each January 1st thereafter, and up to 80 hours of unused sick time carried forward from one calendar year to the next + Additional paid time away may be requested to deal with critical or emergency issues for family members + Optional 10 paid days per full calendar year to volunteer For non-sales roles, employees are also eligible to earn annual bonuses subject to Cisco's policies. Employees on sales plans earn performance-based incentive pay on top of their base salary, which is split between quota and non-quota components, subject to the applicable Cisco plan. For quota-based incentive pay, Cisco typically pays as follows: + .75% of incentive target for each 1% of revenue attainment up to 50% of quota; + 1.5% of incentive target for each 1% of attainment between 50% and 75%; + 1% of incentive target for each 1% of attainment between 75% and 100%; and + Once performance exceeds 100% attainment, incentive rates are at or above 1% for each 1% of attainment with no cap on incentive compensation. For non-quota-based sales performance elements such as strategic sales objectives, Cisco may pay 0% up to 125% of target. Cisco sales plans do not have a minimum threshold of performance for sales incentive compensation to be paid. The applicable full salary ranges for this position, by specific state, are listed below: New York City Metro Area: $165,000.00 - $277,600.00 Non-Metro New York state & Washington state: $146,700.00 - $247,000.00 * For quota-based sales roles on Cisco's sales plan, the ranges provided in this posting include base pay and sales target incentive compensation combined. ** Employees in Illinois, whether exempt or non-exempt, will participate in a unique time off program to meet local requirements. Cisco is an Affirmative Action and Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, national origin, genetic information, age, disability, veteran status, or any other legally protected basis. Cisco will consider for employment, on a case by case basis, qualified applicants with arrest and conviction records.
    $165k-277.6k yearly 34d ago
  • Remote Pre-Sales Security Systems Engineer - Access Control & CCTV

    Kastle Systems 3.6company rating

    Remote job

    Together, We Enhance Innovation and Growth i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations. i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most. This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success. Responsibilities * Possess a thorough understanding of standard Electronic Security technology (ACS, IDS, FDS, CCTV) and supporting equipment such as computer software/hardware, databases, and networking infrastructure. * Ability to review architectural, electrical, telecommunication, security engineering floor plans, riser drawings, device schedules, and detail drawings. * Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions. * Review of Field Site Survey documentation and provide technical assistance with RFI/RFP responses. * Create solution design documentation (drawings, BOMs, solution design summaries). * Provide technical support for in-office and on-site team members. * Support management in the process of creating documentation for implementing new technology with new and existing customers. * Maintain familiarity with current and emerging electronic security technologies such as access control, video surveillance, intrusion detection, biometrics, etc. and industry leading vendors. Qualifications * A minimum of 3-7 years previous experience in the industry. * Associate or bachelor's degree in relevant field preferred or applicable amount of experience in the appropriate field may be substituted for the educational background. * Experience in the design and planning of access control and video systems. * Professional Electronic Security Certifications or training (Lenel, Genetec, C-Cure. Avigilon, Axis, Bosch, Milestone, etc.) preferred. Company Overview This is a Security Systems Engineer career opportunity with i2G Systems. Learn more about i2G: *************************************** "Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here: *********************************************************************************************************************************************************************************** Equal Opportunity Statement We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws.
    $100k-140k yearly est. Auto-Apply 11d ago
  • Cyber Analyst, Digital Forensics Incident Response

    Bay 4.7company rating

    Remote job

    Why you should join our At-Bay Security team: At-Bay is a fast-growth InsurSec company (Insurance x Cybersecurity) on a mission to bring innovative products to the market that help protect small businesses from digital risks. As an InsurSec provider, we uniquely combine insurance with mission-critical security technologies, threat intelligence, and human expertise, to bridge the critical security capability gap that exists among SMBs in the community. We believe InsurSec is an $80B market opportunity and we are excited to expand our DFIR team in order to help expand our reach and influence in the business and security community, of which we serve 35,000 customers. The Role: Cybersecurity Analysts focused on Digital Forensics and Incident Response (DFIR) deliver incident investigation and response services to At-Bay insureds via: Forensically sound collection, transmission, and storage of digital evidence Analysis of digital evidence to identify indicators of compromise and adversary activity Development of incident timelines and theories of compromise Identification of incident root causes Participation in threat actor negotiations as necessary (e.g., ransom negotiations, etc.) Participation in incident recovery (e.g., restoration of data from backups, reimaging workstations and servers, rebuilding network infrastructure, etc.) activities as necessary Development and delivery of incident reports to document key incident details for engagement stakeholders including executive leaders for insureds, breach coach attorneys, and At-Bay claims management staff as necessary Development and delivery of recommendations to mitigate the risk of future incidents for impacted insureds Development and delivery of incident response training and simulations for targeted insureds Key skills: Previous digital forensics and incident response experience Strong oral and written communication skills Previous hands-on experience performing digital forensics and incident response, including several of the following: Business Email Compromise Ransomware Digital evidence collection and analysis Development and analysis of cyber threat intelligence Leadership of or participation in investigations involving digital evidence Intrusion detection / cyber threat hunting Malware analysis Incident recovery activities such as restoration of data from backups, operation of decryptor tools, etc. Previous hands-on experience working in information technology operations (e.g., Network Operations Center, Security Operations Center, Incident Response Team, etc.) Minimum requirements: Bachelor's degree or equivalent Minimum of 2 years of experience in cybersecurity operations, incident response, incident recovery, or another security discipline Willingness to travel as needed to perform job functions Preferred requirements: Significant undergraduate or graduate coursework in computer science, computer engineering, information systems, or cybersecurity Previous background in law enforcement or government/military with experience leading complex technical investigations Knowledge of cloud environments, including knowledge of cloud security products and services offered by major cloud service providers (e.g., AWS, Azure, Google) Experience in a top-10 cyber consulting firm or leading DFIR provider preferred One or more industry cybersecurity certifications (e.g., GCIH, Security+, CISSP, etc.) Work location: USA, Nationwide Fully Remote Our estimated base pay range for this role is $80,000-$115,000 per year. Base salary is determined by a variety of factors including but not limited to market data, location, internal equitability, domain knowledge, experiences and skills. In general, if the position sparks your interest we encourage you to apply - our team prioritizes talent. #LI-CK1
    $80k-115k yearly Auto-Apply 41d ago
  • Cyber Security Spec

    Ford Global

    Remote job

    DSAA ADSD AD
    $76k-102k yearly est. Auto-Apply 24d ago
  • Cyber Insider Threat Analyst (Remote)

    RTX

    Remote job

    Country: United States of America Remote U.S. Citizen, U.S. Person, or Immigration Status Requirements: U.S. citizenship is required, as only U.S. citizens are authorized to access information under this program/contract. Security Clearance: None/Not Required RTX Corporation is an Aerospace and Defense company that provides advanced systems and services for commercial, military and government customers worldwide. It comprises three industry-leading businesses - Collins Aerospace Systems, Pratt & Whitney, and Raytheon. Its 185,000 employees enable the company to operate at the edge of known science as they imagine and deliver solutions that push the boundaries in quantum physics, electric propulsion, directed energy, hypersonics, avionics and cybersecurity. The company, formed in 2020 through the combination of Raytheon Company and the United Technologies Corporation aerospace businesses, is headquartered in Arlington, VA. The following position is to join our RTX Enterprise Services team: Role Overview: Enterprise Services (ES) Cybersecurity has an immediate opening for a qualified insider threat analyst to join RTX Cyber Defense reporting to the Associate Director of Cyber Insider Threat Operations. As an insider threat analyst, you will be responsible for supporting the analysis, monitoring and triage of alerts stemming from potential insider threats. What You Will Do: Perform log analysis to detect anomalies, leveraging expertise in security operations tools to monitor and safeguard sensitive data. Utilize behavioral analytics and endpoint security solutions to identify and investigate unusual patterns. Monitor potential data exfiltration points using data loss prevention tools and other security solutions to detect and prevent unauthorized transfers. Apply Open-Source Intelligence (OSINT) techniques to gather and analyze publicly available information related to insider threats. Identify insider threat trends and patterns to assist content teams in the development of new detection rules and models. Articulate the implications of the risks relative to insider threats and educate team members, peers and stakeholders on the potential impacts. Review data, alerts and behaviors to identify potential concerns from multiple angles, gather information and understand and articulate information gaps needed to inform decisions. Work independently and with teams to define and complete analysis activities. Document findings in a manner that technical and non-technical stakeholders understand and can articulate findings to leadership and peers. Perform initial analysis on data from systems to identify unexpected or malicious activity across channels while understanding how activity fits into the threat landscape. Assist in building processes, procedures and training for the insider threat team. Collaborate with stakeholders to provide suggestions and feedback for validation and improvement of various tools, models, and processes. Stay updated on the latest developments and trends in insider threats, emerging and/or advanced persistent attack vectors, and industry best practices, incorporating this knowledge into RTX's defense strategies. Perform other duties as assigned and as required to continuously drive process excellence. Qualifications You Must Have: Typically requires a University Degree or equivalent experience and a minimum 5 years of experience, or an Advanced Degree and a minimum 3 year's experience. Minimum 5 years supporting a cyber insider threat program and/or a cyber incident response team, including at least 3 years with cybersecurity tools and technologies used to detect and mitigate insider threats, including, but not limited to security information and event monitoring (SIEM), user entity and behavior analytics (UEBA), user activity monitoring (UAM), data loss prevention (DLP) technologies and endpoint security solutions. Must be able to effectively communicate (verbal and written) technical and strategic details to peers, leadership, and stakeholders with varying levels of operational expertise. The ability to obtain and maintain a U.S. government issued security clearance is required. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance. Qualifications We Prefer: Insider Threat specific training/certifications such as CERT Insider Threat course work or Center for Development of Security Excellence (CDSE). Industry certifications in information security or technology such as, CISSP, CISM, CGEIT. Experience collaborating with teams inside and outside of Digital Technology (ex. Privacy, Legal, HR). Preferred candidate will have experience with Operating System, cloud access, and web proxy event logs, endpoint/extended detection & response, and security incident & event management (SIEM) platforms. Demonstrate critical thinking and problem-solving skills. What We Offer: Whether you're just starting out on your career journey or are an experienced professional, we offer a robust total rewards package with compensation; healthcare, wellness, retirement and work/life benefits; career development and recognition programs. Some of the benefits we offer include parental (including paternal) leave, flexible work schedules, achievement awards, educational assistance and child/adult backup care. Learn More & Apply Now! Work Location: Remote Please consider the following role type definition as you apply for this role: Remote: This position is currently designated as remote. However, the successful candidate will be required to work from one of the 50 U.S. states (excluding U.S. Territories). Employees who are working in Remote roles will work primarily offsite (from home). An employee may be expected to travel to the site location as needed. As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote. The salary range for this role is 82,000 USD - 164,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window. RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act. Privacy Policy and Terms: Click on this link to read the Policy and Terms
    $82k-111k yearly est. Auto-Apply 58d ago
  • Cyber Security Analyst II

    Cybersheath 3.7company rating

    Remote job

    Job Description CyberSheath Services International LLC is a rapidly growing Security and IT Managed Services Provider primarily focused on providing Cybersecurity services to the Defense Industrial Base (DIB). We are excited to be expanding our staff due to our growth and are looking to add a Cyber Security Analyst to our Security Operations team! CyberSheath integrates compliance and threat mitigation efforts and eliminates redundant security practices that don't improve and, in fact, may weaken an organization's security posture. Our professionals tell clients where to stop spending, where to invest, and how to take what they are already doing and integrate it in a way that delivers improved security. Successful candidates for CyberSheath are self-motivated, think out of the box, work, and solve issues independently. Additionally, our most successful people are self-starters and willing to put on many hats in order to succeed. CyberSheath is fast-growing and seeks candidates who want to be part of our upward trajectory. Job Overview The Cyber Security Analyst II is responsible for advanced security incident triage, investigation, and response across Microsoft 365, Azure, and on-premises infrastructure. Serves as the escalation point for complex security incidents while implementing containment and remediation procedures in hybrid environments. Key Responsibilities Investigate and respond to escalated security incidents across Microsoft cloud and on-premises environments Perform advanced incident analysis using Microsoft Defender suite and Azure Sentinel Conduct security assessment of Azure/Microsoft 365 configurations and implement hardening recommendations Analyze and respond to advanced Active Directory attacks (Kerberoasting, Pass-the-Hash, Golden Ticket) Monitor and investigate Exchange Server logs, email flow patterns, and phishing campaigns Analyze federation security including ADFS token-based attacks and SAML token manipulation Configure and tune WAF/firewall rule sets and investigate related security incidents Develop network segmentation strategies and identify lateral movement attempts Develop and maintain incident response playbooks for various attack scenarios Coordinate incident response activities with cross-functional teams Required Qualifications 3-5 years in cybersecurity with 2+ years SOC experience Deep knowledge of hybrid Microsoft environments (Microsoft 365, Azure, on-premises AD) Experience with SIEM platforms and security monitoring tools Scripting proficiency (PowerShell, Python) Strong analytical and communication skills Microsoft Certified: Security Operations Analyst (SC-200) One additional security certification: EC-Council CSA, CompTIA Security+, or similar Preferred Qualifications Microsoft Certified: Azure Security Engineer (AZ-500) Microsoft Certified: Identity and Access Administrator (SC-300) CrowdStrike Certified Falcon Responder (CCFR) or equivalent EDR certification CISSP, SSCP, CCSP Skills & Expertise Strong Proficiency with Microsoft Defender suite (Endpoint, Office 365, Identity, Cloud Apps) Azure Sentinel KQL query development and alert configuration Azure AD/Entra ID security configuration and attack path analysis Active Directory security assessment including GPOs, trust relationships, and delegation Email security and phishing detection/response Cloud security posture management Incident handling and digital forensics Threat intelligence analysis and implementation Work Environment CyberSheath is a fully remote organization, and this will be a work-from-home position The schedule for this role is: Week One: Friday - Sunday 8:00 AM - 8:00 PM Week Two: Friday - Monday 8:00 AM - 8:00 PM Travel requirements: 0-5% yearly. Please note that this role will be part of our SOC on-call rotation CyberSheath is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity, national origin, age, protected veteran status, among other things, or status as a qualified individual with a disability. Budgeted Pay Range$70,000-$100,000 USD
    $70k-100k yearly 5d ago
  • Cyber Threat Fusion Analyst

    Beyond SOF

    Remote job

    The client is looking for a Cyber Threat Fusion Analyst. This position will support the Joint Service Provider (JSP) Defensive Cyber Operations (DCO) organization with Cyber Threat Intelligence products and network security monitoring and will perform as the analyst in area of cyber threat intelligence. This role will be based onsite at the Mark Center in Alexandria, VA. Some remote work will be allowed. An active TS/SCI security clearance is required prior to start. Essential Job Functions Implement the core Threat Intelligence concepts (ex. Cyber Kill Chain, MITRE ATT&CK, DoDCAR). Produce reporting for new or emerging threats and threat vectors. Utilize SIEM technologies to correlate security events and logs and identify threats Incorporate threat intelligence into countermeasures to detect and prevent intrusions and malware infections Implement the core Threat Intelligence concepts (ex. Cyber Kill Chain, MITRE ATT&CK, DoDCAR). Produce reporting for new or emerging threats and threat vectors. Utilize SIEM technologies to correlate security events and logs and identify threats. Incorporate threat intelligence into countermeasures to detect and prevent intrusions and malware infections. Identify threat actor tactics, techniques and procedures and based on indicators develops custom signatures and blocks. Understand concepts of log and packet analysis Navigate the command line using specific expressions to manipulate data Handle and organize disparate data about detections, attacks, and attackers Employ discovery techniques and vetting of new intelligence. Create Situational Awareness Reports and Threat Briefs. Minimum Required Qualifications Due to the nature of this position and the information that employees will be required to access, U.S. Citizenship is required. Bachelor's Degree in Computer Science, Computer Engineering or related field and 8+ years of prior relevant experience; additional years of experience may be substituted in lieu of a degree. Computer defense technologies spanning endpoint, network, and open source. Required Security Clearance: TS/SCI. 8570 IAT II certification is required prior to start. It is preferred you will already possess an 8570 CSSP-Analyst certification. If not, it will be required for this to be obtained within 6 months of your start date.
    $74k-100k yearly est. 60d+ ago
  • Associate Cyber Security Operations Analyst

    S&C Minimal

    Remote job

    As an S&C Electric team member, you'll work on projects that have real-world impact. You'll help transform the grid for resilient and reliable power worldwide. S&C has more than a 100-year history of innovation and has been 100% employee-owned since 2012. We continue this legacy as a trusted, forward-thinking leader in the electrical industry. You will advance a safer, more reliable, and more resilient electrical grid. Our products help the grid adapt to severe weather and transition to clean energy. We're big enough to be a respected industry leader but small enough for you to impact our company directly. Our commitment gives you opportunities to impact on and off the job positively. Join S&C to make an impact on tomorrow's energy challenges and become an employee-owner! Hours 8:00 am - 5:00 pm (Mon-Fri) Remote Compensation At S&C, we are dedicated to providing competitive and equitable compensation for all our team members, and we are committed to transparency in our pay practices. The estimated annual base salary range for this position in the United States is $67,200 - $86,814 and can be found in the JOB INFO section below. Individual pay within this salary range is determined by several compensable factors, including performance, knowledge, job-related skills and experience, and relevant education or training. This role is also eligible for S&C's annual incentive plan (AIP), subject to eligibility criteria. Join Our Team as an Associate Cyber Security Operations Analyst! The Grid Enablement Cyber Security and Communications Team is responsible for designing, implementing, and maintaining secure system configurations in accordance with Federal and industry cyber security standards, stakeholder requirements, & operational needs. Leveraging deep expertise in both Information Technology (IT) and Operational Technology (OT), the team applies cyber security principles in a way that not only protects systems but also ensures they operate at their full potential. This approach balances robust security with optimal system performance, supporting the mission-critical functions of our customers. The Associate Cyber Security Operations Analyst is tasked with supporting the Grid Enablement - Cyber Security teams project requirements by assisting in the implementation of cyber security frameworks used by the Department of Defense (DoD) and private sector utilities. This role works closely with technical leads and team members to develop strategies, timelines, and high quality deliverables for cybersecurity and complex engineering projects. Responsibilities include contributing to network design and security architecture, participating in hardware/software specifications, and ensuring device configurations meet compliance and risk management standards while maintaining functionality of mixed IT and OT systems. Key Responsibilities: Work with the technical lead on cybersecurity project scopes Work with Team to develop strategy and timeline to meet project's milestones and deliverables Participate in network design, security architecture, and diagrams Participate in hardware, software, and communications media specification Participate in device configurations and hardening for security compliance and Risk Management Work with Team to ensure timely delivery of high-quality cybersecurity documentation including security policies and procedures, RMF artifacts, configuration guides, testing reports, and training materials Participate in cybersecurity assessments including vulnerability and compliance scanning and reporting Participate in S&C's Information Security program as it applies to customer facing services Must be able to work independently in a fully remote environment Ability to relay technical information to non-technical audiences Function effectively within a global teams environment and under minimal supervision Ability to travel internationally and out of state on average 4-5 times per year for 1-3 weeks per trip Maintains regular and punctual attendance. Attends in-person or virtual meetings as requested or required. Communicates effectively and respectfully with others. Other responsibilities as assigned. Must be a United States Citizen. What you'll Need To Succeed: Degree program in Information Systems, Cybersecurity, Computer Science, Computer Engineering, or a related field in progress to be complete within 2 years (associate's degree) or 3 years (bachelor's degree) from date of hire. It may be permissible to substitute current technical certification to meet requirements at the discretion of the hiring manager. Familiarity with Microsoft security technology Foundational knowledge of cyber security and risk management concepts. Strong interpersonal skills with the ability to interview, facilitate, and collaborate with diverse subject matter experts and stakeholders. Strong written and verbal communication skills with the ability to communicate effectively with all levels of leaders and team members, adjusting communication approaches based on the audience. Strong organizational skills with the ability to manage multiple projects simultaneously to deadlines. Ability to work independently and as part of a team. Strong attention to detail and ability to follow activities through on time and with accuracy. Critical thinking and problem-solving skills and an ability to identify potential issues and seek support for resolution. Proficient in Microsoft Office products including Outlook, Excel, and PowerPoint. Preferred: At least 1 year experience in cyber security or technical field. S&C Electric is committed to equal-opportunity employment. All employees and applicants will be considered without regard to age, color, disability, gender, national origin, race, religion, sexual orientation, gender identity, protected veteran status, or any other classification protected by federal, state, or local law. If you are an individual with a disability and need an accommodation to complete the application, please email us at *******************. No fixed deadline #LI-BB1
    $67.2k-86.8k yearly Auto-Apply 2d ago
  • Cyber Security Analyst

    Military, Veterans and Diverse Job Seekers

    Remote job

    Responsibilities: Investigate security incidents and escalate when necessary Work Incident Response and Administrative tickets Perform and develop data mining queries using Splunk/Splunk ES Communicate in a clear and concise manner with Leadership, Customers and Peers Monitor and respond to multiple shared Mailbox inquiries Provide vulnerability, threat, and risk mitigation support Monitor Security Operations Dashboards for alerts Support daily Operations briefings Monitor and answer the SOC phone hotline Support customer defined metrics reports Support government data calls This opportunity offers remote work! Candidates must be willing to work in a SOC environment and demonstrate strong problem-solving skills Must be able to work well both on their own (in an individual setting) as well as with others (in a team setting) Must possess strong self-initiative, curiosity, and diligence - must be willing to engage with the team, in the capacity of both learning and sharing information
    $74k-100k yearly est. 60d+ ago
  • Global Cyber Wordings Analyst

    Liberty Mutual 4.5company rating

    Remote job

    Join our global Cyber team as a Wordings Analyst supporting the Global Cyber Wordings Manager in the strategic development and governance of our Cyber and Tech policy suite, including Liberty Cyber Resolution and Liberty Tech Resolution. This role is a hands-on business enabler: you will help translate complex legal and regulatory requirements into clear, market-ready wordings, maintain our global clause library, support manuscript negotiations, and produce practical tools that empower underwriters and strengthen broker confidence. It's an excellent opportunity for an early-career insurance wordings or legal professional to build expertise in a fast-moving, global specialty line and make a visible impact on growth, innovation, and client experience. Key responsibilities: Wording library and drafting support Maintain and expand the global wording library centered on Liberty Cyber Resolution and Liberty Tech Resolution, including endorsements, exclusions, and guidance notes. Redline and prepare first drafts of standard clauses and endorsements; ensure consistency with definitions, coverage intent, and plain-language standards. Track version control, change logs, approvals, and archiving; Assist with localization for different jurisdictions, coordinating translations and filing documentation with Legal/Compliance. Commercial enablement Build practical tools (playbooks, FAQs, objection-handling guides, coverage summaries) to help regional teams position our products and close deals efficiently. Prepare broker/client comparison decks and battlecards; support pitches, RFP/RFI responses, and manuscript negotiations with clause comparisons and recommended alternatives. Triage wording queries from regions; track SLAs and referral approvals per the global governance framework. Partner closely with Underwriting, Product, Global Cyber Engagement, Claims, Legal/Compliance, and regional leaders to deliver accurate, timely support and uphold governance standards. Regulatory and legal stewardship Monitor and synthesize global regulatory and market developments (e.g., Lloyd's cyber war/systemic guidance, GDPR, DORA, NIS2, sanctions) into succinct briefs and recommended wording actions. Maintain audit-ready documentation; assist with regulatory filings or attestations where required. Claims partnership and feedback loop Collaborate with Claims to capture lessons from disputes and litigation trends; draft guidance notes and propose clarifications to improve coverage certainty. Support coverage position letters and documentation packs with research, citations, and clause histories. Innovation and product development support Help draft prototype wordings for new propositions Check alignment between underlying policy wordings and reinsurance treaty/facultative clauses. Administer wording management tools, ensuring robust version control, approval workflows, and usage analytics. Build dashboards and trackers for adoption of standard forms, deviation rates, SLA performance, disputes, and audit findings; provide monthly reporting to stakeholders. Qualifications Bachelor's degree in business, economics, or other quantitative field. Minimum 3 years, typically 4 years or more of relevant work experience. 2 - 5 years of experience in insurance wordings, legal/paralegal support, underwriting support, or product documentation; cyber specialty experience preferred. Strong drafting, redlining, and proofreading skills with a plain-language mindset and exceptional attention to detail. Working knowledge of insurance policy structures, endorsements, exclusions, and coverage interpretation; familiarity with cyber war/systemic language, sanctions, and privacy regulations is advantageous. Research and synthesis skills to translate complex regulatory/legal topics into practical guidance and actionable updates. Proficiency with MS Word (advanced track changes/redlining), Excel (trackers and dashboards), PowerPoint (training/pitch materials), and document/enablement tools. Collaborative, service-oriented approach; comfortable operating in a global matrix and meeting defined SLAs. Curiosity about cybersecurity risks and the incident response ecosystem; willingness to learn common threat scenarios to inform practical drafting. About Us Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role. At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve. We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: *********************** Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law. Fair Chance Notices California Los Angeles Incorporated Los Angeles Unincorporated Philadelphia San Francisco We can recommend jobs specifically for you! Click here to get started.
    $76k-99k yearly est. Auto-Apply 26d ago
  • Info Security Analyst II / IS - Information Security / Full-time

    Childrens Hospital Los Angeles 4.7company rating

    Remote job

    NATIONAL LEADERS IN PEDIATRIC CARE Ranked among the top 10 pediatric hospitals in the nation, Children's Hospital Los Angeles (CHLA) provides the best care for kids in California. Here world-class experts in medicine, education and research work together to deliver family-centered care half a million times each year. From primary to complex critical care, more than 350 programs and services are offered, each one specially designed for children. The CHLA of the future is brighter than can be imagined. Investments in technology, research and innovation will create care that is personal, convenient and empowering. Our scientists will work with clinical experts to take laboratory discoveries and create treatments that are a perfect match for every patient. And together, CHLA team members will turn health care into health transformation. Join a hospital where the work you do will matter-to you, to your colleagues, and above all, to our patients and families. The work will be challenging, but always rewarding. It's Work That Matters. Overview PLEASE NOTE: This is a remote position. In accordance with CHLA policy, candidates must establish primary residency in California prior to their start date. Purpose Statement/Position Summary: The Information Security Analyst II is responsible for monitoring and addressing information security alerts, improving detection and response capabilities, and participating in efforts to streamline processes and improve efficiency. They will also be responsible for conducting security training and awareness campaigns, reporting on results, and conducting remedial training. The analyst will contribute to information security policies and standards as they are developed and maintained, in accordance with NIST CSF and HIPAA. They will be a mentor for Information Security Analyst I and peers. Minimum Qualifications/Work Experience: Required: 5 years of progressive experience in computing and information security, including experience with information security operations, utilization of multiple security tools to conduct investigations, and security training, preferably in a healthcare environment. * Management of information security tools. * Knowledge of vulnerability resolution. * Skills in risk analysis and hands-on issue resolution. * General awareness of NIST CSF and HIPAA security rule. * Experience analyzing security incidents utilizing multiple security tools for discovery. * Strong analytical and problem-solving skills Education/Licensure/Certification: Required: Associate degree in a related field or equivalent combination of education and experience may be considered. Certifications in two of the following required: * ISACA * CompTIA * EC-Council * Azure Security * AWS Security * Cisco * (ISC)² * GIAC Pay Scale Information $75,712.00-$124,384.00 CHLA values the contribution each Team Member brings to our organization. Final determination of a successful candidate's starting pay will vary based on a number of factors, including, but not limited to education and experience within the job or the industry. The pay scale listed for this position is generally for candidates that meet the specified qualifications and requirements listed on this specific job description. Additional pay may be determined for those candidates that exceed these specified qualifications and requirements. We provide a competitive compensation package that recognizes your experience, credentials, and education alongside a robust benefits program to meet your needs. CHLA looks forward to introducing you to our world-class organization where we create hope and build healthier futures. Children's Hospital Los Angeles (CHLA) is a leader in pediatric and adolescent health both here and across the globe. As a premier Magnet teaching hospital, you'll find an environment that's alive with learning, rooted in care and compassion, and home to thought leadership and unwavering support. CHLA is dedicated to creating hope and building healthier futures - for our patients, as well as for you and your career! CHLA has been affiliated with the Keck School of Medicine of the University of Southern California since 1932. At Children's Hospital Los Angeles, our work matters. And so do each and every one of our valued team members. CHLA is an Equal Employment Opportunity employer. We consider qualified applicants for all positions without regard to race, color, religion, creed, national origin, sex, gender identity, age, physical or mental disability, sexual orientation, marital status, veteran or military status, genetic information or any other legally protected basis under federal, state or local laws, regulations or ordinances. We will also consider for employment qualified applicants with criminal history, in a manner consistent with the requirements of state and local laws, including the LA City Fair Chance Ordinance and SF Fair Chance Ordinance. Qualified Applicants with disabilities are entitled to reasonable accommodation under the California Fair Employment and Housing Act and the Americans with Disabilities Act. Please contact CHLA Human Resources if you need assistance completing the application process. Our various experiences, perspectives and backgrounds allow us to better serve our patients and create a strong community at CHLA. Information Security
    $75.7k-124.4k yearly 5d ago

Learn more about security system engineer jobs

Work from home and remote security system engineer jobs

Nowadays, it seems that many people would prefer to work from home over going into the office every day. With remote work becoming a more viable option, especially for security system engineers, we decided to look into what the best options are based on salary and industry. In addition, we scoured over millions of job listings to find all the best remote jobs for a security system engineer so that you can skip the commute and stay home with Fido.

We also looked into what type of skills might be useful for you to have in order to get that job offer. We found that security system engineer remote jobs require these skills:

  1. Architecture
  2. Nist
  3. Dod
  4. Rmf
  5. Linux

We didn't just stop at finding the best skills. We also found the best remote employers that you're going to want to apply to. The best remote employers for a security system engineer include:

  1. Lockheed Martin
  2. NVIDIA
  3. Sandia National Labs

Since you're already searching for a remote job, you might as well find jobs that pay well because you should never have to settle. We found the industries that will pay you the most as a security system engineer:

  1. Professional
  2. Finance
  3. Education

Top companies hiring security system engineers for remote work

Most common employers for security system engineer

RankCompanyAverage salaryHourly rateJob openings
1NVIDIA$143,007$68.7512
2Sandia National Labs$113,005$54.330
3Jacobs Enterprises$106,199$51.0659
4Zivaro$103,627$49.820
5Future Tech Enterprise$96,973$46.620
6Lockheed Martin$94,886$45.62336

Browse computer and mathematical jobs